Stalker risk: Kids $30 smartwatch exposes exact location data of 5,000 users
An insecure website gives access to attackers on thousands of kids and allows them to connect to kids' watches with the same privileges as parents.
An insecure website gives access to attackers on thousands of kids and allows them to connect to kids' watches with the same privileges as parents.
Fixing archaic cybersecurity attitudes will take a “catastrophic” event, admit mining executives who see regulations as far less effective
David Braue | 19 Nov | Read more
For years now there have been a plethora of reports around IoT device security being compromised, affecting user privacy and safety.
A small blunder by Amazon developers exposed users to attacks on home wi-fi networks.
And while you’re at it ditch all your unsupported hardware.
New EU law aims to raise cybersecurity standards across borders.
Wow, I have to say a lot happened in the last two days of May 2019. I am not sure where exactly I should start but let's make it simple and start from the beginning – 4:30 am on Thursday the 30th of May.
Craig Ford | 04 Jun | Read more
US NIST doesn’t have a system for certifying internet-connected things.
Retailers should take smart toys with known vulnerabilities off shelfs, demands UK consumer group.
"Code reuse is vulnerability reuse", warns security firm after finding critical flaw in a third-party code library.
Even if you change the default passwords on these cameras, hackers can still bypass it if they know the hardcoded passwords.
Qualcomm-owned NXP and fellow European chipmakers support new regulations to enforce IoT cybersecurity standards.
Increasingly-accessible penetration testing services are helping businesses build iterative security testing into product development lifecycles and Internet of Things (IoT) manufacturers are among the most enthusiastic adopters, the head of IBM’s penetration testing operation has reported as the nascent unit nears the end of its first year in operation.
David Braue | 11 May | Read more
In a sign of slowly maturing managerial attitudes towards security, a new survey found that CSOs are feeling less pressure from management to fast-track IT projects and new technology rollouts. They may also be finding that detecting insider threats is easier than they think – although many are still running periodic vulnerability assessments that may be a recipe for disaster.
David Braue | 18 Apr | Read more
IBM has rolled out its Watson cognitive capabilities to do battle with rival enterprise mobile device management (MDM) platforms.